{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:57:27Z","timestamp":1725901047337},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642316678"},{"type":"electronic","value":"9783642316685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_9","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"116-129","source":"Crossref","is-referenced-by-count":1,"title":["Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Labitzke","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/988772.988777","volume-title":"Proceedings of the 5th ACM Conference on Electronic Commerce, EC 2004","author":"A. Acquisti","year":"2004","unstructured":"Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, EC 2004, pp. 21\u201329. ACM, New York (2004)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-20317-6_2","volume-title":"Privacy and Identity Management for Life","author":"B. Berg","year":"2011","unstructured":"Berg, B., P\u00f6tzsch, S., Leenes, R., Borcea-Pfitzmann, K., Beato, F.: Privacy in social software. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 33\u201360. Springer, Heidelberg (2011)"},{"key":"9_CR3","first-page":"437","volume-title":"Proceedings of the Fourteenth International Conference on Information Systems Development (ISD 2005)","author":"M. Bergmann","year":"2005","unstructured":"Bergmann, M., Rost, M., Pettersson, J.S.: Exploring the feasibility of a spatial user interface paradigm for privacy-enhancing technology. In: Proceedings of the Fourteenth International Conference on Information Systems Development (ISD 2005), Karlstad, Sweden, pp. 437\u2013448. Springer, Heidelberg (2005)"},{"key":"9_CR4","doi-asserted-by":"crossref","first-page":"493","DOI":"10.3233\/JCS-2007-15502","volume":"15","author":"A. Bhargav-Spantzel","year":"2007","unstructured":"Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User centricity: A taxonomy and open issues. J. Comput. Secur.\u00a015, 493\u2013527 (2007)","journal-title":"J. Comput. Secur."},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1017\/S0140525X00032325","volume":"16","author":"R. Dunbar","year":"1993","unstructured":"Dunbar, R.: Coevolution of neocortex size, group size and language in humans. Behavioral and Brain Sciences\u00a016(4), 681\u2013735 (1993)","journal-title":"Behavioral and Brain Sciences"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-20317-6_13","volume-title":"Privacy and Identity Management for Life","author":"S. Fischer-Huebner","year":"2011","unstructured":"Fischer-Huebner, S., Hedbom, H., Waestlund, E.: Trust and assurance HCI. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 245\u2013260. Springer, Heidelberg (2011)"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1102199.1102214","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005","author":"R. Gross","year":"2005","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 71\u201380. ACM, New York (2005)"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-20317-6_6","volume-title":"Privacy and Identity Management for Life","author":"H. Hedbom","year":"2011","unstructured":"Hedbom, H., Pulls, T., Hansen, M.: Transparency tools. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 135\u2013143. Springer, Heidelberg (2011)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"H\u00f6llrigl, T., Kuehner, H., Dinger, J., Hartenstein, H.: User-controlled automated identity delegation. In: Proceedings of the 6th IEEE\/IFIP International Conference on Network and Service Management (2010)","DOI":"10.1109\/CNSM.2010.5691295"},{"key":"9_CR10","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-15257-3_25","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"C. Kahl","year":"2010","unstructured":"Kahl, C., B\u00f6ttcher, K., Tschersich, M., Heim, S., Rannenberg, K.: How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol.\u00a0330, pp. 277\u2013288. Springer, Heidelberg (2010)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1880153.1880164","volume":"40","author":"B. Krishnamurthy","year":"2010","unstructured":"Krishnamurthy, B.: I know what you will do next summer. SIGCOMM Comput. Commun. Rev.\u00a040, 65\u201370 (2010)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1397735.1397744","volume-title":"Proceedings of the First Workshop on Online Social Networks, WOSP 2008","author":"B. Krishnamurthy","year":"2008","unstructured":"Krishnamurthy, B., Wills, C.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, WOSP 2008, pp. 37\u201342. ACM, New York (2008)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/1880153.1880164","volume":"40","author":"B. Krishnamurthy","year":"2010","unstructured":"Krishnamurthy, B., Wills, C.: On the leakage of personally identifiable information via online social networks. SIGCOMM Comput. Commun. Rev.\u00a040, 112\u2013117 (2010)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9_CR14","unstructured":"Labitzke, S., Dinger, J., Hartenstein, H.: How I and others can link my various social network profiles as a basis to reveal my virtual appearance. In: LNI - Proceedings of the 4th DFN Forum Communication Technologies, GI-Edition (June 2011)"},{"key":"9_CR15","volume-title":"Proceedings of the 5th International ACM Workshop on Social Network Mining and Analysis, SNAKDD 2011","author":"S. Labitzke","year":"2011","unstructured":"Labitzke, S., Taranu, I., Hartenstein, H.: What your friends tell others about you: Low cost linkability of social network profiles. In: Proceedings of the 5th International ACM Workshop on Social Network Mining and Analysis, SNAKDD 2011. ACM, San Diego (2011)"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1145\/1240624.1240695","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007","author":"C.A.C. Lampe","year":"2007","unstructured":"Lampe, C.A.C., Ellison, N., Steinfield, C.: A familiar face(book): profile elements as signals in an online social network. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 435\u2013444. ACM, New York (2007)"},{"key":"9_CR17","unstructured":"Scerri, S., Gimenez, R., Hermann, F., Bourimi, M., Thiel, S.: Digital.me - towards an integrated personal information sphere. In: Workshop on the Federated Social Web Summit, FSW 2011 (2011)"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1524\/itit.2009.0518","volume":"51","author":"F. Schell","year":"2009","unstructured":"Schell, F., H\u00f6llrigl, T., Hartenstein, H.: Federated identity management as a basis for integrated information management. It \u2013 Information Technology\u00a051(1), 14\u201323 (2009)","journal-title":"It \u2013 Information Technology"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/1556460.1556500","volume-title":"Proceedings of the Fourth International Conference on Communities and Technologies","author":"J. Schrammel","year":"2009","unstructured":"Schrammel, J., K\u00f6ffel, C., Tscheligi, M.: How much do you tell? information disclosure behaviour indifferent types of online communities. In: Proceedings of the Fourth International Conference on Communities and Technologies, pp. 275\u2013284. ACM, New York (2009)"},{"issue":"11","key":"9_CR20","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1016\/j.jss.2011.06.048","volume":"84","author":"M. Tschersich","year":"2011","unstructured":"Tschersich, M., Kahl, C., Heim, S., Crane, S., B\u00f6ttcher, K., Krontiris, I., Rannenberg, K.: Towards privacy-enhanced mobile communities \u2013 architecture, concepts and user trials. Journal of Systems and Software\u00a084(11), 1947\u20131960 (2011)","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"9_CR21","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.ijinfomgt.2009.03.007","volume":"29","author":"S. Weiss","year":"2009","unstructured":"Weiss, S.: Privacy threat model for data portability in social network applications. International Journal of Information Management\u00a029(4), 249\u2013254 (2009)","journal-title":"International Journal of Information Management"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:43:23Z","timestamp":1620128603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_9","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}